Use the GPS to receive the device's location.Collect present text messages and intercept future ones.In terms of features, the operator of the AndroRAT implant can perform the following tasks on the infected device: The Old AndroRAT Project is Still Being Updated by Random Cybercriminals In addition to this, the attackers could use a text message or a phone call to command the AndroRAT implant to run.
![androrat phone androrat phone](https://net2.com/wp-content/uploads/2021/03/word-image-2.jpeg)
#Androrat phone android#
As soon as AndroRAT is installed, it will apply changes to the Android configuration, so that the malware will be started even if the device gets restarted. Just like Windows RATs, AndroRAT also consists of a server and client component – the server is meant to be run on the infected device, while the operator can use the client to control the implant. Of course, this is not enough to stop cybercriminals, and AndroRAT has become one of the most popular names in the hacking field when it comes to Android Remote Access Trojans. Another thing worth noting is that the original GitHub repository for the project states that it was aimed to be used for educational purposes, and it is a part of a university project – the original author warns that it should not be used with harmful intent. However, AndroRAT has undergone numerous updates to make it compatible with modern Android versions, as well as enhance its functionality.
![androrat phone androrat phone](http://securityaffairs.co/wordpress/wp-content/uploads/2015/02/Android-hacked.jpg)
The peculiar thing about this threat is that it was first published eight years ago and had rather basic features. AndroRAT is an old malware project that continues to be updated by cybercriminals who got their hands on the original source code.